Impact
Fortinet FortiOS versions 7.6.0 through 7.6.4 contain a flaw that may allow an unauthenticated attacker to bypass LDAP authentication for Agentless VPN or FSSO policies when the remote LDAP server is configured in a particular way. This bypass undermines the authentication mechanism, potentially enabling an attacker to connect to protected resources without valid credentials. The weakness is classified as CWE-305, an authentication bypass due to insufficient credential handling.
Affected Systems
FortiOS 7.6.0, 7.6.1, 7.6.2, 7.6.3, and 7.6.4 from Fortinet are impacted. Upgrading to FortiOS 7.6.5 or any 8.0.0 release removes the vulnerability. System administrators should verify that their deployment runs a patched version.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity risk, while the EPSS score of less than 1% suggests exploitation is currently unlikely. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is remote, as an unauthenticated attacker could target the VPN or FSSO service to trigger the bypass.
OpenCVE Enrichment